Penetration Testing for a Company Vs. Being Freelance

Introduction The Cybersecurity job market has become a hot field, seeking new, highly qualified candidates. It is a diverse field with various job types, but one of the most desired positions is... Go on to the site to read the full article ... Read More

Building Effective Defense with the Phishing Kill Chain

| | Security Awareness
What is the Phishing Kill Chain? Many people have heard of the cyber kill chain, but what about the phishing kill chain? Like the cyber kill chain, this model of phishing attacks can be used to help... Go on to the site to read the full article ... Read More

DoD 8570 IAM Certification – Level I

| | General Security
What is the DoD IAM Level 1? The Department of Defense (DoD) directive 8570 provides guidance on how the DoD workforce manages and executes Information Assurance (IA) functions. IA Technical (IAT)... Go on to the site to read the full article ... Read More

DoD IASAE Overview

| | DoD 8570
What is the DoD IASAE? The U.S. Department of Defense (DoD) IASAE covers the requirements for the Information Assurance architecture and engineering areas (IA System Architects and Engineers) as... Go on to the site to read the full article ... Read More
The Advantages & Disadvantages of Outsourcing Incident Response

The Advantages & Disadvantages of Outsourcing Incident Response

Companies usually outsource tasks if they are more cost effective and can produce consistent results. Outsourcing incident response functions ensures a company will get consistent, reliable results... Go on to the site to read the full article ... Read More
A 10 Step Post-Breach Incident Response Checklist

A 10 Step Post-Breach Incident Response Checklist

Introduction Any organization with cyber-related assets needs to have a well written incident response (IR) plan. The incident response plan is meant to cover the procedures needed to protect,... Go on to the site to read the full article ... Read More
Phishing Attacks in the Hospitality Industry

Phishing Attacks in the Hospitality Industry

Introduction The hospitality industry has been consistently hit with cyberattacks year after year. Fast food chains, large retailers, and every major hotel chain have been victims. As with most... Go on to the site to read the full article ... Read More
Phishing Attacks in the Engineering Industry

Phishing Attacks in the Engineering Industry

Introduction The engineering field consists of various types of disciplines. It has multiple branches but most types of engineers can be placed into one of the following categories: civil,... Go on to the site to read the full article ... Read More
9 Tips for CompTIA Security+ Exam Success

9 Tips for CompTIA Security+ Exam Success

| | General Security
The Security+ exam is used to assess candidates’ knowledge on basic security concepts and best practices. This is considered an entry-level exam, but is not an easy test to pass. Follow these nine... Go on to the site to read the full article ... Read More
10 Tips For Certified Ethical Hacker (CEH) Exam Success

10 Tips For Certified Ethical Hacker (CEH) Exam Success

| | General Security
As the EC-Council states on its website, “to beat a hacker, you need to think like one!” Accordingly, the Certified Ethical Hacker (CEH) exam tests candidates’ knowledge on hacking techniques. These... Go on to the site to read the full article ... Read More
Loading...